Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

SCCM Collection explained

Posted on 2010-11-14
1
Medium Priority
?
1,488 Views
Last Modified: 2013-11-21
I can see in the All Systems collection it has column headers such as Client, Approved, Assigned, Blocked, Client Type, Obsolete and Active.  Is there a document and/or a very clear web site explaining all these and what they mean and when they change
0
Comment
Question by:WNottsC
1 Comment
 
LVL 7

Accepted Solution

by:
George Simos earned 2000 total points
ID: 34134199
Hi WNottsC,

Here is the official documentation of clients states in the collection view and their meanings http://technet.microsoft.com/en-us/library/bb633138.aspx if you need more than this, i'd be happy to assist you.
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Remote Desktop Protocol or RDP has become an essential tool in many offices. This article will show you how to set up an external IP to point directly to an RDP session. There are many reasons why this is beneficial but perhaps the top reason is con…
Welcome to my series of short tips on migrations. Whilst based on Microsoft migrations the same principles can be applied to any type of migration. My first tip Migration Tip #1 – Source Server Health can be found here: http://www.experts-exchang…
How to fix incompatible JVM issue while installing Eclipse While installing Eclipse in windows, got one error like above and unable to proceed with the installation. This video describes how to successfully install Eclipse. How to solve incompa…
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…

972 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question